aboutsummaryrefslogtreecommitdiff
path: root/src/torcontrol.cpp
Commit message (Collapse)AuthorAgeFilesLines
* Merge #7300: [trivial] Add missing copyright headersWladimir J. van der Laan2016-01-271-0/+4
|\ | | | | | | | | | | fabcee1 Remove copyright header from autogenerated chainparamsseeds.h (MarcoFalke) fa60d05 Add missing copyright headers (MarcoFalke) fa7e4c0 Bump copyright headers to 2014 (MarcoFalke)
| * Add missing copyright headersMarcoFalke2016-01-051-0/+4
| |
* | Merge pull request #7313Wladimir J. van der Laan2016-01-181-6/+6
|\ \ | | | | | | | | | 0331aa3 Fixing typos on security-check.py and torcontrol.cpp (calebogden)
| * | Fixing typos on security-check.py and torcontrol.cppcalebogden2016-01-081-6/+6
| |/
* / Typo fixes in commentsChris Wheeler2016-01-171-1/+1
|/
* torcontrol debug: Change to a blanket message that covers both casesMarcoFalke2015-12-161-1/+1
|
* torcontrol: only output disconnect if -debug=torDaniel Cousens2015-11-301-1/+3
|
* Connect to Tor hidden services by defaultPeter Todd2015-11-261-0/+9
| | | | | | | Adds 127.0.0.1:9050 for the .onion proxy if we can succesfully connect to the control port. Natural followup to creating hidden services automatically.
* torcontrol improvements and fixesWladimir J. van der Laan2015-11-121-84/+194
| | | | | | | | | | | | | | - Force AUTHCOOKIE size to be 32 bytes: This provides protection against an attack where a process pretends to be Tor and uses the cookie authentication method to nab arbitrary files such as the wallet - torcontrol logging - fix cookie auth - add HASHEDPASSWORD auth, fix fd leak when fwrite() fails - better error reporting when cookie file is not ok - better init/shutdown flow - stop advertizing service when disconnected from tor control port - COOKIE->SAFECOOKIE auth
* Better error message if Tor version too oldPeter Todd2015-11-101-1/+3
|
* net: Automatically create hidden service, listen on TorWladimir J. van der Laan2015-11-101-0/+573
Starting with Tor version 0.2.7.1 it is possible, through Tor's control socket API, to create and destroy 'ephemeral' hidden services programmatically. https://stem.torproject.org/api/control.html#stem.control.Controller.create_ephemeral_hidden_service This means that if Tor is running (and proper authorization is available), bitcoin automatically creates a hidden service to listen on, without user manual configuration. This will positively affect the number of available .onion nodes. - When the node is started, connect to Tor through control socket - Send `ADD_ONION` command - First time: - Make it create a hidden service key - Save the key in the data directory for later usage - Make it redirect port 8333 to the local port 8333 (or whatever port we're listening on). - Keep control socket connection open for as long node is running. The hidden service will (by default) automatically go away when the connection is closed.